2019 American Control Conference (ACC) 2019
DOI: 10.23919/acc.2019.8814712
|View full text |Cite
|
Sign up to set email alerts
|

Synthesis of Supremal Successful Normal Actuator Attackers on Normal Supervisors

Abstract: In this work, we propose and develop a new discrete-event based actuator attack model on the closed-loop system formed by the plant and the supervisor. We assume the actuator attacker partially observes the execution of the closed-loop system and eavesdrops the control commands issued by the supervisor. The attacker can modify each control command on a specified subset of attackable events. The attack principle of the actuator attacker is to remain covert until it can establish a successful attack and lead the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
73
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 35 publications
(73 citation statements)
references
References 17 publications
0
73
0
Order By: Relevance
“…Φ sa f e can specify the state avoidance property (i.e., the avoidance of certain states in the plant) or more general safety property [11]. In [3] and [11], the attackers are assumed to be covert. That is, the attacker needs to remain covert in the course of attacking the closed-loop systems until damages are inflicted upon the attacked closed-loop systems.…”
Section: Main Ideamentioning
confidence: 99%
See 4 more Smart Citations
“…Φ sa f e can specify the state avoidance property (i.e., the avoidance of certain states in the plant) or more general safety property [11]. In [3] and [11], the attackers are assumed to be covert. That is, the attacker needs to remain covert in the course of attacking the closed-loop systems until damages are inflicted upon the attacked closed-loop systems.…”
Section: Main Ideamentioning
confidence: 99%
“…Thus, to synthesize a resilient supervisor against covert attackers, we let Φ assume = Φ covert . On the other hand, if we let Φ assume = True, then the covertness requirement is removed and each synthesized resilient supervisor, if any, needs to guard against the damages caused by risky attacks [11].…”
Section: Main Ideamentioning
confidence: 99%
See 3 more Smart Citations